AskOverflow.Dev

AskOverflow.Dev Logo AskOverflow.Dev Logo

AskOverflow.Dev Navigation

  • 主页
  • 系统&网络
  • Ubuntu
  • Unix
  • DBA
  • Computer
  • Coding
  • LangChain

Mobile menu

Close
  • 主页
  • 系统&网络
    • 最新
    • 热门
    • 标签
  • Ubuntu
    • 最新
    • 热门
    • 标签
  • Unix
    • 最新
    • 标签
  • DBA
    • 最新
    • 标签
  • Computer
    • 最新
    • 标签
  • Coding
    • 最新
    • 标签
主页 / server / 问题 / 961153
Accepted
Martin Barker
Martin Barker
Asked: 2019-04-03 09:54:42 +0800 CST2019-04-03 09:54:42 +0800 CST 2019-04-03 09:54:42 +0800 CST

Cisco ASA 5505 无法与 Site-to-Site VPN 上的任何内容通信

  • 772

所以我有一个带有 2 个站点到站点 VPN 和一个远程访问 VPN 的 Cisco ASA 5505 设置,现在任何连接的东西(硬连线、S2S VPN 或 RA VPN)都可以毫无问题地相互通信。

问题是通过其中一个 S2S VPN 我有一个 Active Directory 设置,我正在尝试更改 RA VPN 以使用此 AS DS 提供的 LDAP 登录,但似乎 ASA 其自身无法通过S2S VPN。

所以 AD DS 服务器在 IP 上10.1.18.109

(由 ASA 运行的网络范围)

ASA is on 10.101.0.1/255.255.0.0
In Office (so Hardwired into ASA) is on 10.101.1.0/255.255.0.0
RA VPN is on 10.101.2.0/255.255.0.0

(网络范围通过 S2S VPN)

S2S VPN Ireland is on 10.2.0.0/255.255.0.0
S2S VPN London is on 10.1.0.0/255.255.0.0

所以我需要 ASA 与 10.1.18.109 对话,目前它无论如何都无法与它对话 LDAP 只是连接超时,并且 ping 失败了。

我试过的

VPN 的所有 NAT 规则都启用了已检查 ACL 的 Route Lookup,应该允许它

我如何测试

我一直在通过内部ping inside 10.1.18.109和外部的 VLAN 测试 pingping outside 10.1.18.109

我认为是错误的

我不是最好的,所以我认为这与在 10.101.0.1 IP 地址上运行的 ASA 有关,并且不允许访问 VPN

当前配置。

 : Saved
    :
    ASA Version 9.1(1) 
    !
    hostname ciscoasa
    domain-name fabrikam.ltd
    enable password xxxxxxxxxxxxxx encrypted
    passwd xxxxxxxxxxxxxxxx encrypted
    names
    ip local pool OutOfOfficePool 10.101.2.1-10.101.2.254 mask 255.255.255.0
    !
    interface Ethernet0/0
     switchport access vlan 2
    !
    interface Ethernet0/1
    !
    interface Ethernet0/2
    !
    interface Ethernet0/3
    !
    interface Ethernet0/4
    !
    interface Ethernet0/5
    !
    interface Ethernet0/6
    !
    interface Ethernet0/7
    !
    interface Vlan1
     nameif inside
     security-level 100
     ip address 10.101.0.1 255.255.0.0 
    !
    interface Vlan2
     nameif outside
     security-level 0
     ip address y.y.y.y 255.255.255.248 
    !
    ftp mode passive
    dns domain-lookup inside
    dns domain-lookup outside
    dns server-group DefaultDNS
     name-server 10.1.18.109
     domain-name fabrikam.ltd
    same-security-traffic permit intra-interface
    object network obj_any
     subnet 0.0.0.0 0.0.0.0
    object network inside
     subnet 10.101.0.0 255.255.0.0
    object network inside-subnet
     subnet 10.101.0.0 255.255.0.0
    object network obj-SrcNet
     subnet 0.0.0.0 0.0.0.0
    object network obj-amzn-lon
     subnet 10.1.0.0 255.255.0.0
    object network obj-amzn-ire
     subnet 10.2.0.0 255.255.0.0
    object network NETWORK_OBJ_10.101.2.0_24
     subnet 10.101.2.0 255.255.255.0
    object network inoffice
     subnet 10.101.1.0 255.255.255.0
    object network outoffice
     subnet 10.101.2.0 255.255.255.0
    object network 10.X.X.X
     range 10.2.0.0 10.2.255.255
    access-list outside_acl extended permit ip host x.x.x.x host y.y.y.y 
    access-list outside_acl extended permit ip host v.v.v.v host y.y.y.y 
    access-list outside_acl extended permit ip host m.m.m.m host y.y.y.y 
    access-list outside_acl extended permit ip host z.z.z.z host y.y.y.y 
    access-list acl-amzn-lon extended permit ip any 10.1.0.0 255.255.0.0 
    access-list IRELAND-135 extended permit ip host m.m.m.m host y.y.y.y 
    access-list IRELAND-159 extended permit ip host z.z.z.z host y.y.y.y 
    access-list IRELAND-LOCAL extended permit ip any4 10.2.0.0 255.255.0.0 
    access-list outside_access_in extended permit ip host x.x.x.x host y.y.y.y 
    access-list outside_access_in extended permit ip host v.v.v.v host y.y.y.y 
    access-list acl-amzn extended permit ip any4 10.1.0.0 255.255.0.0 
    access-list amzn-filter extended permit ip 10.1.0.0 255.255.0.0 10.101.0.0 255.255.0.0 
    access-list ireland-filter extended permit ip 10.2.0.0 255.255.0.0 10.101.0.0 255.255.0.0 
    access-list outside_cryptomap_2 extended permit ip any4 10.2.0.0 255.255.0.0 
    access-list outside_cryptomap_2 extended permit ip any 10.1.0.0 255.255.0.0 
    access-list outside_cryptomap_3 extended permit ip any 10.2.0.0 255.255.0.0 
    access-list outside_cryptomap_1 extended permit ip any 10.1.0.0 255.255.0.0 
    access-list tcp_bypass extended permit tcp 10.101.1.0 255.255.255.0 10.101.2.0 255.255.255.0 
    access-list tcp_bypass extended permit tcp 10.1.0.0 255.255.0.0 10.101.2.0 255.255.255.0 
    access-list tcp_bypass extended permit tcp 10.101.2.0 255.255.255.0 10.1.0.0 255.255.0.0 
    access-list tcp_bypass extended permit tcp 10.2.0.0 255.255.0.0 10.101.2.0 255.255.255.0 
    access-list tcp_bypass extended permit tcp 10.101.2.0 255.255.255.0 10.2.0.0 255.255.0.0 
    access-list inside_access_in extended permit ip any any 
    access-list acl-outside extended permit icmp any any echo 
    access-list acl-inside extended permit icmp any any echo 
    access-list global_mpc extended permit ip any any 
    pager lines 24
    logging enable
    logging asdm informational
    mtu inside 1500
    mtu outside 1500
    icmp unreachable rate-limit 1 burst-size 1
    icmp permit any outside
    no asdm history enable
    arp timeout 14400
    no arp permit-nonconnected
    nat (inside,outside) source static obj-SrcNet obj-SrcNet destination static obj-amzn-ire obj-amzn-ire route-lookup
    nat (inside,outside) source static obj-SrcNet obj-SrcNet destination static obj-amzn-lon obj-amzn-lon route-lookup
    nat (inside,outside) source static any any destination static NETWORK_OBJ_10.101.2.0_24 NETWORK_OBJ_10.101.2.0_24 no-proxy-arp route-lookup
    !
    object network obj_any
     nat (inside,outside) dynamic interface
    object network inside-subnet
     nat (inside,outside) dynamic interface
    !
    nat (inside,outside) after-auto source dynamic any interface
    access-group inside_access_in in interface inside
    route outside 0.0.0.0 0.0.0.0 109.239.111.1 1
    timeout xlate 3:00:00
    timeout pat-xlate 0:00:30
    timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
    timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
    timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
    timeout tcp-proxy-reassembly 0:01:00
    timeout floating-conn 0:00:00
    dynamic-access-policy-record DfltAccessPolicy
    aaa-server LDAP_SRV_GRP protocol ldap
    aaa-server LDAP_SRV_GRP (outside) host 10.1.18.109
     ldap-base-dn dc=fabrikam, dc=ltd
     ldap-scope subtree
     ldap-naming-attribute sAMAccountName
     ldap-login-password *****
     ldap-login-dn cn=Administrator, cn=Users, dc=fabrikam, dc=ltd
     server-type microsoft
    user-identity default-domain LOCAL
    http server enable
    http 10.0.0.0 255.0.0.0 inside
    no snmp-server location
    no snmp-server contact
    snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart
    sysopt connection tcpmss 1379
    sla monitor 1
     type echo protocol ipIcmpEcho 10.1.0.1 interface outside
     frequency 5
    sla monitor schedule 1 life forever start-time now
    sla monitor 2
     type echo protocol ipIcmpEcho 10.2.0.1 interface outside
     frequency 5
    sla monitor schedule 2 life forever start-time now
    sla monitor 5
     type echo protocol ipIcmpEcho 8.8.8.8 interface outside
     frequency 5
    sla monitor schedule 5 life forever start-time now
    crypto ipsec ikev1 transform-set transform-amzn-lon esp-aes esp-sha-hmac 
    crypto ipsec ikev1 transform-set transform-amzn-ire esp-aes esp-sha-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac 
    crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac 
    crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac 
    crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac 
    crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS esp-aes esp-sha-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS mode transport
    crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS esp-aes-256 esp-sha-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS mode transport
    crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS esp-3des esp-sha-hmac 
    crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS mode transport
    crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS esp-des esp-sha-hmac 
    crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS mode transport
    crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS esp-aes-192 esp-sha-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS mode transport
    crypto ipsec ikev1 transform-set transfrom-amzn esp-aes esp-sha-hmac 
    crypto ipsec ikev1 transform-set transform-amzn esp-aes esp-sha-hmac 
    crypto ipsec ikev1 transform-set transfrom-amzn1 esp-aes esp-sha-hmac 
    crypto ipsec ikev1 transform-set transform-amzn1 esp-aes esp-sha-hmac 
    crypto ipsec ikev1 transform-set transform-ireland esp-aes esp-sha-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS esp-aes esp-md5-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS mode transport
    crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS esp-aes-192 esp-md5-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS mode transport
    crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS esp-aes-256 esp-md5-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS mode transport
    crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS esp-3des esp-md5-hmac 
    crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS mode transport
    crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS esp-des esp-md5-hmac 
    crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS mode transport
    crypto ipsec ikev1 transform-set ESP-AES128-SHA1_TRANS esp-aes esp-sha-hmac 
    crypto ipsec ikev1 transform-set ESP-AES128-SHA1_TRANS mode transport
    crypto ipsec ikev1 transform-set APPLE_CLIENT esp-3des esp-sha-hmac 
    crypto ipsec ikev1 transform-set APPLE_CLIENT mode transport
    crypto ipsec ikev2 ipsec-proposal DES
     protocol esp encryption des
     protocol esp integrity sha-1 md5
    crypto ipsec ikev2 ipsec-proposal 3DES
     protocol esp encryption 3des
     protocol esp integrity sha-1 md5
    crypto ipsec ikev2 ipsec-proposal AES
     protocol esp encryption aes
     protocol esp integrity sha-1 md5
    crypto ipsec ikev2 ipsec-proposal AES192
     protocol esp encryption aes-192
     protocol esp integrity sha-1 md5
    crypto ipsec ikev2 ipsec-proposal AES256
     protocol esp encryption aes-256
     protocol esp integrity sha-1 md5
    crypto ipsec security-association replay window-size 128
    crypto ipsec security-association pmtu-aging infinite
    crypto ipsec df-bit clear-df outside
    crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group1
    crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-192-SHA ESP-AES-256-SHA ESP-3DES-SHA ESP-DES-SHA ESP-AES-128-SHA-TRANS ESP-AES-192-SHA-TRANS ESP-AES-256-SHA-TRANS ESP-3DES-SHA-TRANS ESP-DES-SHA-TRANS
    crypto dynamic-map DYN_OUTSIDE 10000 set ikev1 transform-set ESP-AES128-SHA1_TRANS
    crypto dynamic-map DYN_OUTSIDE 10000 set reverse-route
    crypto map amazon_lon_map 1 match address acl-amzn-lon
    crypto map amazon_lon_map 1 set pfs 
    crypto map amazon_lon_map 1 set peer x.x.x.x v.v.v.v 
    crypto map amazon_lon_map 1 set ikev1 transform-set transform-amzn-lon
    crypto map amazon_lon_map 1 set ikev2 ipsec-proposal AES256 AES192 AES 3DES DES
    crypto map amazon_lon_map 1 set security-association lifetime seconds 3600
    crypto map amazon_lon_map 2 match address outside_cryptomap_2
    crypto map amazon_lon_map 2 set pfs 
    crypto map amazon_lon_map 2 set peer m.m.m.m z.z.z.z 
    crypto map amazon_lon_map 2 set ikev1 transform-set transform-ireland
    crypto map amazon_lon_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP
    crypto map MAP_OUTSIDE 1 match address outside_cryptomap_1
    crypto map MAP_OUTSIDE 1 set pfs 
    crypto map MAP_OUTSIDE 1 set peer x.x.x.x v.v.v.v 
    crypto map MAP_OUTSIDE 1 set ikev1 transform-set transfrom-amzn
    crypto map MAP_OUTSIDE 1 set ikev2 ipsec-proposal AES256 AES192 AES 3DES DES
    crypto map MAP_OUTSIDE 1 set security-association lifetime seconds 3600
    crypto map MAP_OUTSIDE 1 set reverse-route
    crypto map MAP_OUTSIDE 2 match address outside_cryptomap_3
    crypto map MAP_OUTSIDE 2 set pfs 
    crypto map MAP_OUTSIDE 2 set peer m.m.m.m z.z.z.z 
    crypto map MAP_OUTSIDE 2 set ikev1 transform-set transform-ireland
    crypto map MAP_OUTSIDE 2 set security-association lifetime seconds 3600
    crypto map MAP_OUTSIDE 2 set reverse-route
    crypto map MAP_OUTSIDE 10000 ipsec-isakmp dynamic DYN_OUTSIDE
    crypto map MAP_OUTSIDE interface outside
    crypto ca trustpoint _SmartCallHome_ServerCA
     crl configure
    crypto ca trustpoint ASDM_TrustPoint0
     enrollment self
     subject-name CN=ciscoasa
     keypair OutOfOfficeKeyPair
     proxy-ldc-issuer
     crl configure
    crypto ca trustpoint ASDM_TrustPoint1
     enrollment terminal
     subject-name CN=leeds.internal.fabrikam.ltd,O=fabrikam Limited,C=UK
     keypair OutOfOfficeKeyPair
     crl configure
    crypto ca trustpoint ASDM_TrustPoint2
     enrollment terminal
     crl configure
    crypto ca trustpoint ASDM_TrustPoint3
     enrollment terminal
     no validation-usage
     crl configure
    crypto ca trustpool policy
    crypto ca certificate chain _SmartCallHome_ServerCA
     certificate ca * removed*
      quit
    crypto ca certificate chain ASDM_TrustPoint0
     certificate 7f301c5c *removed*

      quit
    crypto ca certificate chain ASDM_TrustPoint3
     certificate ca *removed*
      quit
    crypto isakmp identity address 
    crypto ikev2 policy 1
     encryption aes-256
     integrity sha
     group 5 2
     prf sha
     lifetime seconds 86400
    crypto ikev2 policy 10
     encryption aes-192
     integrity sha
     group 5 2
     prf sha
     lifetime seconds 86400
    crypto ikev2 policy 20
     encryption aes
     integrity sha
     group 5 2
     prf sha
     lifetime seconds 86400
    crypto ikev2 policy 30
     encryption 3des
     integrity sha
     group 5 2
     prf sha
     lifetime seconds 86400
    crypto ikev2 policy 40
     encryption des
     integrity sha
     group 5 2
     prf sha
     lifetime seconds 86400
    crypto ikev1 enable outside
    crypto ikev1 policy 201
     authentication pre-share
     encryption aes
     hash sha
     group 2
     lifetime 28800
    crypto ikev1 policy 1000
     authentication pre-share
     encryption aes-256
     hash sha
     group 2
     lifetime 86400
    crypto ikev1 policy 2000
     authentication pre-share
     encryption 3des
     hash sha
     group 2
     lifetime 86400
    crypto ikev1 policy 3000
     authentication pre-share
     encryption aes
     hash sha
     group 2
     lifetime 86400
    telnet timeout 5
    ssh timeout 5
    console timeout 0

    dhcpd domain leeds.internal.fabrikam.ltd
    dhcpd auto_config outside
    dhcpd option 3 ip 10.101.0.1 y.y.y.y
    dhcpd option 6 ip 10.1.13.58 8.8.8.8
    !
    dhcpd address 10.101.1.1-10.101.1.254 inside
    dhcpd domain leeds.internal.fabrikam.ltd interface inside
    dhcpd option 3 ip 10.101.0.1 interface inside
    dhcpd option 6 ip 10.1.13.58 8.8.8.8 interface inside
    dhcpd enable inside
    !
    threat-detection basic-threat
    threat-detection statistics access-list
    no threat-detection statistics tcp-intercept
    webvpn
     enable outside
    group-policy DefaultRAGroup internal
    group-policy DefaultRAGroup attributes
     dns-server value 8.8.8.8 8.8.4.4
     vpn-tunnel-protocol l2tp-ipsec 
     default-domain value leeds.internal.fabrikam.ltd
    group-policy DfltGrpPolicy attributes
    group-policy OutOfOffice internal
    group-policy OutOfOffice attributes
     dns-server value 10.1.18.109 1.1.1.1
     vpn-tunnel-protocol ikev1 l2tp-ipsec 
     default-domain value leeds.internal.fabrikam.ltd
    group-policy ireland-filter internal
    group-policy ireland-filter attributes
     vpn-filter value ireland-filter
     vpn-tunnel-protocol ikev1 
    group-policy filter1 internal
    group-policy filter1 attributes
     vpn-filter value amzn-filter
     vpn-tunnel-protocol ikev1 ikev2 
    group-policy filter internal
    group-policy filter attributes
     vpn-filter value acl-amzn
    username user1 password xxxxxxxxxxxxxxxxxxxxxxxx nt-encrypted
    username user1 attributes
     vpn-group-policy OutOfOffice
     vpn-tunnel-protocol ikev1 l2tp-ipsec 
     service-type remote-access 
    tunnel-group DefaultRAGroup general-attributes
     address-pool OutOfOfficePool
     default-group-policy DefaultRAGroup
    tunnel-group DefaultRAGroup ipsec-attributes
     ikev1 pre-shared-key *****
    tunnel-group DefaultRAGroup ppp-attributes
     authentication pap
     authentication ms-chap-v2
    tunnel-group x.x.x.x type ipsec-l2l
    tunnel-group x.x.x.x general-attributes
     default-group-policy filter1
    tunnel-group x.x.x.x ipsec-attributes
     ikev1 pre-shared-key *****
     isakmp keepalive threshold 10 retry 10
    tunnel-group v.v.v.v type ipsec-l2l
    tunnel-group v.v.v.v general-attributes
     default-group-policy filter1
    tunnel-group v.v.v.v ipsec-attributes
     ikev1 pre-shared-key *****
     isakmp keepalive threshold 10 retry 10
    tunnel-group IRELAND-135 type ipsec-l2l
    tunnel-group IRELAND-135 general-attributes
     default-group-policy ireland-filter
    tunnel-group IRELAND-135 ipsec-attributes
     ikev1 pre-shared-key *****
     isakmp keepalive threshold 10 retry 10
    tunnel-group IRELAND-159 type ipsec-l2l
    tunnel-group IRELAND-159 general-attributes
     default-group-policy ireland-filter
    tunnel-group IRELAND-159 ipsec-attributes
     ikev1 pre-shared-key *****
     isakmp keepalive threshold 10 retry 10
    tunnel-group OutOfOffice type remote-access
    tunnel-group OutOfOffice general-attributes
     address-pool OutOfOfficePool
     authentication-server-group LDAP_SRV_GRP LOCAL
     default-group-policy OutOfOffice
    tunnel-group OutOfOffice ipsec-attributes
     ikev1 pre-shared-key *****
     ikev1 trust-point ASDM_TrustPoint0
    tunnel-group OutOfOffice ppp-attributes
     authentication ms-chap-v2
    tunnel-group m.m.m.m type ipsec-l2l
    tunnel-group m.m.m.m general-attributes
     default-group-policy ireland-filter
    tunnel-group m.m.m.m ipsec-attributes
     ikev1 pre-shared-key *****
    tunnel-group z.z.z.z type ipsec-l2l
    tunnel-group z.z.z.z general-attributes
     default-group-policy ireland-filter
    tunnel-group z.z.z.z ipsec-attributes
     ikev1 pre-shared-key *****
    !
    class-map inspection_default
     match access-list global_mpc
     match default-inspection-traffic
    class-map tcp_bypass
     match access-list tcp_bypass
    !
    !
    policy-map type inspect dns preset_dns_map
     parameters
      message-length maximum client auto
      message-length maximum 512
    policy-map global_policy
     class inspection_default
      inspect dns preset_dns_map 
      inspect ftp 
      inspect h323 h225 
      inspect h323 ras 
      inspect rsh 
      inspect rtsp 
      inspect esmtp 
      inspect sqlnet 
      inspect skinny  
      inspect sunrpc 
      inspect xdmcp 
      inspect sip  
      inspect netbios 
      inspect tftp 
      inspect ip-options 
      inspect icmp 
    policy-map tcp_bypass_policy
     class tcp_bypass
      set connection advanced-options tcp-state-bypass
    !
    service-policy global_policy global
    service-policy tcp_bypass_policy interface inside
    prompt hostname context 
    no call-home reporting anonymous
    : end

我什至尝试了端口 80 TCP ping 无济于事,

在外部界面上

Sending 5 TCP SYN requests to 10.1.18.109 port 80
from 109.239.111.4, timeout is 2 seconds:
?????
Success rate is 0 percent (0/5)

在内部界面

Sending 5 TCP SYN requests to 10.1.18.109 port 80
from 109.239.111.4, timeout is 2 seconds:
?????
Success rate is 0 percent (0/5)

Amazon AWS 上的 VPC 流日志未显示与该 IP 地址的任何尝试连接

我的 NAT 规则很容易看到, ADSM NAT 规则输出

cisco-asa
  • 2 2 个回答
  • 739 Views

2 个回答

  • Voted
  1. Kamil J
    2019-04-03T14:54:14+08:002019-04-03T14:54:14+08:00

    让我指出根据您的描述要检查的一般“提示”。希望它会有所帮助,即使它不是直接的“复制和粘贴”解决方案。我很抱歉没有通过您提供的配置... :-)

    NAT - 此 LDAP 流量的源地址/接口

    通常 NAT 是针对网络设置的,因此通过的流量(不是直接源自 ASA)与规则“匹配”以“排除”默认 NAT (MASQUERADE) 或设置流量所需的特定 NAT。尝试捕获少量相关流量并关注数据包的源 IP。来源可能不是您所期望的...

    如果您没有明确处理它,相关接口(即使对于 ipsec 隧道)在外面。在这种情况下,IP 不是您在“ipsec 隧道”通信(加密映射、NAT、防火墙规则等)的配置中期望/设置的 IP,结果是即使从任何其他“内部”设备都可以正常工作。在这种情况下,此流量的显式 NAT 规则将有助于适应与隧道的通信(我想到的第一个选项)。

    • 3
  2. Best Answer
    user3629081
    2019-05-04T12:27:24+08:002019-05-04T12:27:24+08:00

    在这种情况下,您需要的一件事是management-access <interface-name>全局命令,其中“< interface-name >”是内部接口 nameif。默认情况下,ASA 不会将自己的流量放入 VPN 隧道,因此此命令会授予该行为。此命令还允许您从隧道的另一端通过 SSH 连接到防火墙。

    为了使其正常工作,覆盖防火墙子网的 NAT 语句需要route-lookup添加关键字,这听起来就像你的那样。

    • 2

相关问题

  • 如何在 Cisco ASA 55xx 路由器上允许 ICMP Echo 请求?

  • 具有动态 IP 的 Cisco ASA 发夹

  • Cisco ASA 设备是否有“显示 cdp 邻居”类型命令?

  • 为另一个 IP 地址范围配置 Cisco ASA 5505

  • Cisco ASA 5505 许可 [重复]

Sidebar

Stats

  • 问题 205573
  • 回答 270741
  • 最佳答案 135370
  • 用户 68524
  • 热门
  • 回答
  • Marko Smith

    新安装后 postgres 的默认超级用户用户名/密码是什么?

    • 5 个回答
  • Marko Smith

    SFTP 使用什么端口?

    • 6 个回答
  • Marko Smith

    命令行列出 Windows Active Directory 组中的用户?

    • 9 个回答
  • Marko Smith

    什么是 Pem 文件,它与其他 OpenSSL 生成的密钥文件格式有何不同?

    • 3 个回答
  • Marko Smith

    如何确定bash变量是否为空?

    • 15 个回答
  • Martin Hope
    Tom Feiner 如何按大小对 du -h 输出进行排序 2009-02-26 05:42:42 +0800 CST
  • Martin Hope
    Noah Goodrich 什么是 Pem 文件,它与其他 OpenSSL 生成的密钥文件格式有何不同? 2009-05-19 18:24:42 +0800 CST
  • Martin Hope
    Brent 如何确定bash变量是否为空? 2009-05-13 09:54:48 +0800 CST
  • Martin Hope
    cletus 您如何找到在 Windows 中打开文件的进程? 2009-05-01 16:47:16 +0800 CST

热门标签

linux nginx windows networking ubuntu domain-name-system amazon-web-services active-directory apache-2.4 ssh

Explore

  • 主页
  • 问题
    • 最新
    • 热门
  • 标签
  • 帮助

Footer

AskOverflow.Dev

关于我们

  • 关于我们
  • 联系我们

Legal Stuff

  • Privacy Policy

Language

  • Pt
  • Server
  • Unix

© 2023 AskOverflow.DEV All Rights Reserve